You are on page 1of 10

Performance Analysis of the IEEE 802.

11 MAC and Physical Layer Protocol

Mohammad Hossein Mamshaei, Gion Reto Cantieni∗, Chadi Barakat, and Thierry Turletti
Institut National de Recherche en Informatique et en Automatique (INRIA)
2004 route des Lucioles, Sophia-Antipolis, France 06902
Telephone: +33492387610, Fax: +33492387978
Email: {manshaei,barakat,turletti}@sophia.inria.fr

Abstract offered bandwidth is shared among all stations (STAs). This


standard allows the same MAC layer to operate on top of
We present in this paper an analytical model that ac- one of several PHY layers.
counts for the positions of stations with respect to the Ac- Different analytical models and simulation studies have
cess Point (AP) while evaluating the performance of 802.11 been elaborated the last years to evaluate the 802.11 MAC
MAC layer. Our work is based on the Bianchi’s model layer performance. These studies mainly aim at computing
where the performance of 802.11 MAC layer is computed the saturation throughput of the MAC layer and focus on
using a discrete time Markov chain, but where all stations its improvement. One of the most promising models has
are implicitly assumed to be located at the same distance been the so-called Bianchi model [2]. It provides closed-
to the AP. In our model, given the position of one station, form expressions for the saturation throughput and for the
we compute its saturation throughput while conditioning probability that a packet transmission fails due to collision.
on the positions of the other concurrent stations. Further, The modeling of the 802.11 MAC layer is an important
our model provides the total saturation throughput of the issue for the evolution of this technology. One of the major
medium. We solve the model numerically and we show that shortcomings in existing models is that the PHY layer con-
the saturation throughput per station is strongly dependent ditions are not considered. The existing models for 802.11
not only on the station’s position but also on the positions of assume that all STAs have the same physical conditions at
the other stations. Results confirm that a station achieves a the receiving STA (same power, same coding,. . .), so when
higher throughput when it is closer to the AP but bring out two or more STAs emit a packet in the same slot time, all
that there is a distance threshold above which the through- their packets are lost, which may not be the case in reality
put decrease is fast and significant. When a station is far when for instance one STA is close to the receiving STA
from the AP compared to the other stations, it will end up and the other STAs far from it [3]. This behavior, called
by contending for the bandwidth not used by the other sta- the capture effect, can be analyzed by considering the spa-
tions. We believe that our model is a good tool to dimension tial positions of the STAs. In [4] the spatial positions of
802.11 wireless access networks and to study their capaci- STAs are considered for the purpose of computing the ca-
ties and their performances. pacity of wireless networks, but only an ideal model for the
MAC layer issued from the information theory is used. The
main contribution of this paper is considering both PHY and
1 Introduction MAC layer protocols to analyze the performance of excit-
ing IEEE 802.11 standard. Our work reuses the model for
Nowadays, the IEEE 802.11 WLAN technology of- 802.11 MAC layer from [6], and extends it to consider in-
fers the largest deployed wireless access to the Internet. terference from other STAs. We compute, for a given topol-
This technology specifies both the Medium Access Control ogy, the throughput of any wireless STA using the 802.11
(MAC) and the Physical Layers (PHY) [1]. The PHY layer MAC protocol with a specific PHY layer protocol.
selects the correct modulation scheme given the channel Without losing the generality of the approach, we only
conditions and provides the necessary bandwidth, whereas consider in this paper traffic flows sent from the mobile
the MAC layer decides in a distributed manner on how the STAs in direction to the AP. The case of bidirectional traf-
∗ Corresponding author’s present address: Swiss Federal Institute fic is a straight forward extension; we omit it to ease the
of Technology (EPFL), CH-1015 Lausanne, Switzerland, Email: gion- exposition of our contribution. Further, we assume that all
reto.cantieni@epfl.ch STAs use the Distributed Coordination Function (DCF) of
802.11 and they always have packets to send (case of sat- Frame Space) which is less than DIFS. When a data packet
urated sources). We present an evaluation of our approach is transmitted, all other stations hearing this transmission
for 802.11b with data rates equal to 1 and 2 Mbps and the adjust their Network Allocation Vector (NAV), which is
results indicate that it leads to very accurate results. used for virtual CS at the MAC layer. In optional RTS/CTS
In the next section an overview of the IEEE 802.11 MAC access method, an RTS frame should be transmitted by the
and PHY specifications and the calculation of probability of source and the destination should accept the data transmis-
packet and bit error in an additive white gaussian channel sion by sending a CTS frame prior to the transmission of
are presented. Section 3 addresses some related works on actual data packet. Note that STAs in the sender’s range
MAC and PHY layer modeling in IEEE 802.11. In Section that hear the RTS packet update their NAVs and defer their
4 we present our model and derive the characterizing equa- transmissions for the duration specified by the RTS. Nodes
tions for it. The numerical and simulation results obtained that overhear the CTS packet update their NAVs and refrain
are presented in Section 5. Section 6 concludes the paper from transmitting. This way, the transmission of data packet
with some pointers to our future work. and its corresponding ACK can proceed without interfer-
ence from other nodes (hidden nodes problem).
2 Background Table 1 shows the main characteristics of the IEEE
802.11a/b/g physical layers. 802.11b radios transmit at
2.4GHz and send data up to 11 Mbps using Direct Se-
Two forms of MAC layer have been defined in IEEE
quence Spread Spectrum (DSSS) modulation; whereas
802.11 standard specification named, Distributed Coordi-
802.11a radios transmit at 5GHz and send data up to 54
nation Function (DCF) and Point Coordination Function
Mbps using Orthogonal Frequency Division Multiplexing
(PCF). The DCF protocol uses Carrier Sense Multiple Ac-
(OFDM) [1]. The IEEE 802.11g standard [1], extends the
cess with Collision Avoidance (CSMA/CA) mechanism and
data rate of the IEEE 802.11b to 54 Mbps in an upgraded
is mandatory, while PCF is defined as an option to support
PHY layer named extended rate PHY layer (ERP).
time-bounded delivery of data frames. The DCF protocol
in IEEE 802.11 standard defines how the medium is shared
among stations. DCF which is based on CSMA/CA, con- Table 1. PHY layer Characteristics in 802.11.
sists of a basic access method and an optional channel ac- PHY Layer Characteristic Available in 802.11/a/b/g
cess method with request-to-send (RTS) and clear-to-send Frequency 5, 2.4 GHz
(CTS) exchanged as shown in Fig. 1. Data Rates 1, 2, 5.5, 6, 9, 11, 12,
18, 22, 24, 33, 36, 48, 54 Mbps
Other NAV update with RTS and DATA CW Modulation BPSK, DBPSK, QPSK, DQPSK,

Source RTS DATA


16-QAM, 64-QAM, CCK
Error Correction Code Convolutional codes 1/2, 2/3, 3/4
Destination CTS ACK

Other
NAV update with CTS CW
time: DIFS SIFS SIFS SIFS DIFS In each physical layer, there is a basic transmission mode
(usually used to send ACK, RTS, CTS and PLCP header)
Figure 1. CSMA/CA with RTS/CTS exchange. which has the maximum coverage range among all trans-
mission modes. This maximum range is obtained using
BPSK or DBPSK modulation which have the minimum
If the channel is busy for the source STA, a backoff time probability of bit error for a given SNR compared to other
(measured in slot times) is chosen randomly in the inter- modulation schemes. It has the minimum data rate as well.
val [0, CW ), where CW is called the contention window. As shown in Fig. 2, each packet may be sent using two dif-
This timer is decremented by one as long as the channel ferent rates; the PLCP header is sent at the basic rate while
is sensed idle for a DIFS (Distributed Inter Frame Space) the rest of the packet might be sent at a higher rate. The
time. It stops when the channel is busy and resumes when basic rate is 1 Mbps (with DBPSK modulation and CRC
the channel is idle again for at least DIFS time. CW is an 16 bits) for 802.11b and 6 Mbps (with BPSK and FEC rate
integer with the range determined by PHY layer characteris- equal to 1/2) for 802.11a. The higher rate used to trans-
tics: CWmin and CWmax . CW will be doubled after each mit the physical-layer payload (which includes the MAC
unsuccessful transmission, up to the maximum value which header) is indicated in the PCLP header.
is determined by CWmax + 1. The PLCP Protocol Data Unit (PPDU) frame includes
When the backoff timer reaches zero, the source trans- PLCP preamble, PLCP header, and MPDU. Fig. 3 shows
mits the data packet. The ACK is transmitted by the receiver the format for long preamble in 802.11b. The PLCP pream-
immediately after a period of time called SIFS (Short Inter ble contains the following fields: Synchronization (Sync)

2
Eb
PLCP Header Mac Header + Payload where N 0
is the average signal to noise ratio per bit. The
Eb
N0 of the received signal is derived from SN R using the
Sent with Basic Rate Sent with the rate indicated in PLCP

following relationship:
Figure 2. Packet format in IEEE 802.11. Eb W
= SN R · (4)
N0 Rb
and Start Frame Delimiter (SDF). The PLCP Header con- where Rb (1 and 2 Mbps) is the maximum bit rate of
tains the following fields: Signal, Service, Length, and transmission mode and W (2 MHz) is the unspread band-
CRC. The short PLCP preamble and header may be used width of the signal. Considering the data packet format
to minimize overhead and thus maximize the network data shown in Figure 2 the probability of error for packet is:
throughput. Note that the short PLCP header uses the 2
Mbps with DQPSK modulation and a transmitter using the
p = P ER = 1 − (1 − PeP LCP ) · (1 − PeP ayload ) (5)
short PLCP only can interoperate with the receivers which
are capable of receiving this short PLCP format. In this pa- Where Pe is the probability of error for PLCP (or Pay-
per we suppose that all stations use the long PPDU format load) and is given by:
in 802.11b. We evaluate our model in 802.11b where STAs
use transmission rate equal to 1 and 2 Mbps. Our model Pe = 1 − (1 − Pb )Length (6)
can be employed for all other transmission modes for all
standards if the packet error rate is calculated. Pb is derived from equation 2 and 3 for 1 Mbps and 2
Mbps data rate respectively.
Sent by Basis Mode (1Mbps, 0.192 ms)
Octets: 18 2 1 1 2 2
SYNC SFD Signal Service Length CRC 3 Related Works
PLCP Preamble in 802.11b(144bits) PLCP header in 802.11b(48bits)

There have been various attempts to model and analyze


Figure 3. 802.11b long preamble frame format. the saturation throughput and delay of the IEEE 802.11
DCF protocol since the standards have been proposed. As
explained in the introduction there are different analytical
In this paper, we assume that the noise over the wire- models and simulation studies that analyze the performance
less channel is white Gaussian with spectral density equal of 802.11 MAC layer. As an example Foh and Zuckerman
to N0 /2. In our model we define N0 as the power of the present the analysis of the mean packet delay at different
thermal noise, throughputs for IEEE 802.11 MAC in [5]. Kim and Hou [7]
analyze the protocol capacity of IEEE 802.11 MAC with the
N0 = Nf · Nt = Nf · kT W (1) assumption that the number of active stations having pack-
ets ready for transmission is large. In [8] and [9] they have
where Nf denotes the circuit noise value, k the Boltzmann suggested some extensions to the model proposed in [2] to
constant, T the temperature in Kelvin and W is the fre- evaluate packet delay, the packet drop probability and the
quency bandwidth. For the BPSK modulation1 , the bit error packet drop time. Since in our model we have used the
probability is given by [11]: Bianchi’s model [2] and its extension proposed in [6], we
will detail these models in this section.
Ãr ! Ãr ! Bianchi’s model uses a simple and elegant discrete-time
Eb Eb
PbBP SK = Q 2· =Q 2· (2) Markov chain to analyze the case of saturated STAs, i.e.
N0 N0 STAs that always have packets to send. Wu et al. [6] pro-
posed a scheme named DCF + to enhance the performance
and for QPSK (4-QAM) is: of reliable transport protocol over WLAN and analyzed
it with an extension of Bianchi’s considering finite packet
Ãr ! Ãr ! retry limits as defined in the IEEE 802.11 standard.
Eb 1 Eb
PbQP SK =Q 2· − Q2 2· (3) The retransmission limit is defined in the IEEE
N0 2 N0 802.11 MAC standard specification with the help of
two following counters: Short Retry Count (SRC) and
1 Our expressions for probability of bit error rates are those of BPSK
Long Retry Count (LRC). These counters are incre-
and QPSK, although 802.11 standards use differentially encoded versions
DBPSK and DQPSK for 1 and 2 Mbps, respectively. For coherent detec-
mented and reset independently. SRC is incremented
tion for high SNR values, above BER expressions are applicable to both every time an RTS fails and LRC is incremented
classical and differential modulation schemes. when data transmission fails. Both SRC and LRC

3
are reset to zero after a successful data transmission. Equations (7) and (8) are solved for the values of p and
Data frames are discarded when LRC (SRC) reaches τ . Once these probabilities are obtained, this model com-
dot11LongRetryLimit (dot11ShortRetryLimit). The default putes the saturation throughput Z(p, τ ) of a station. The
values for dot11LongRetryLimit and dot11ShortRetryLimit expression of the throughput is given in Section 4.3, where
are 4 and 7 respectively. Considering this limitation, the we adapt this model to our context. None of the above mod-
Markov chain proposed by Bianchi is modified in [6] as els have considered the channel characteristics (PHY layer).
shown in Fig. 4. Unlike paper [2], in Wu model m is There are a few studies that consider the PHY layer char-
the maximum backoff stage (retransmission count) which acteristics in 802.11 WLANs. We overview them in what
0
is different for data frame and RTS. In Wu model, m repre- follows.
0
sents the maximum contention window, i.e. 2m (CWmin + In [10], the impact of an error-prone channel over all
1) = (CWmax + 1). In fact the key difference between performance measures is analytically analyzed for a traffic
Bianchi model [2] and Wu model [6], is that the Markov saturated IEEE 802.11 WLAN. A modified Markov chain
chain models are different, which is because Wu model con- is used to compute the transmission probability per station:
siders the effects of frame retransmitting limit. the backoff window size that considers the frame-error rates
and the maximal allowable number of retransmission at-

1/W0
tempts. The transition probability from one stage to an-


 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !



 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !



 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !



 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !



 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !

other (in Bianchi’s Markov model) is denoted by p. It is




 

 

 

 

 

 

 

 

 
 
                        



! 


! 


! 


! 


! 


! 


! 


! 


! 

! 

! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! !

1−p 1 1 1 1
(0, 0) (0, 1) (0, 2) (0, W0 − 2) (0, W0 − 1)



p
also the probability of an unsuccessful (re)transmission at-



tempt perceived by a test station as its frame is being trans-


p

































1/Wi






















































































































































































































































































































































































































































































































































































































































































mitted on the channel. They supposed that the unsuccessful
(re)transmission attempt can happen due to: collision of this







































                                































                                







































                                































                                







































                                































                                

1−p 1 1 1 1
(i, 0) (i, 1) (i, 2) (i, Wi − 2) (i, Wi − 1)
p






station with at least one of the n − 1 remaining stations, oc-


curring with probability: p1 = 1−(1−τ )n−1 ; and/or an er-
p































1/Wm
























































































































































































































































































































































































































































































































ror frame, occurring with probability Pf (due to the channel



 


 


 


 


 


 


 


 


 

 

                                



 


 


 


 


 


 


 


 


 

 

                                

1
(m, 0)






















































































1


















































































(m, 1)




























1






















(m, 2)





























































1





















(m, Wm − 2)


























1





















(m, Wm − 1)
fading and/or noise). Then they supposed that both events
are independent and the probability p can be expressed as:
p = 1 − (1 − p1 )(1 − Pf )
Figure 4. Markov model for backoff window. Other calculations are similar to the Markov model (see
Equation (8)). Similar to [2] they express the normalized
In this Bianchi model, the time is divided into slots of saturation throughput of IEEE 802.11 DCF within a single
variable duration based on what happens during a slot: no WLAN cell in an error-prone channel.
transmission, correct transmission, collision. The model In [12], an improved analytical model that calculates
computes among others the probability that a station trans- IEEE 802.11 DCF performance taking into account both
mits in a slot τ , the probability that a transmitted packet col- packet retry limits and transmission errors for the IEEE
lides with other transmissions p, and the saturation through- 802.11a protocol is proposed. Their analysis is very sim-
put of a station Z(p, τ ), which is a function of τ and p as ilar to the model presented in [10].
well as other physical parameters. The packet loss proba- Finally, [13] proposes an analytical model to compute
bility is computed as: the throughput for the single and multi-user cases with a
non ideal channel. This model is validated with system sim-
p = 1 − (1 − τ )n−1 (7) ulations in realistic deployment scenarios. Some changes in
Bianchi’s Markov chain model are proposed as well. In ad-
where n is the total number of STAs. The model also dition they have assumed that the probability Pj , (the failure
gives the expression of τ as a function of the packet loss probability viewed by the station when a packet is transmit-
probability p using the Markov chain that describes the sys- ted) is due to either a collision on the channel (with proba-
tem, see Fig. 4. Let B be the function relating p and τ in bility Pcj ) or without collision but error transmission (with
this model, then: probability P ER). Hence: pj = Pcj + (1 − Pcj )P ER
1 − pm+1 None of these models have considered specific physical
τ = B(p) = b0,0 (8) aspects like modulation, FEC, PLCP format in IEEE 802.11
1−p
or the channel characteristics (e.g. the distance between
and b0,0 (Which is the stationary probability to find the the source and the destination). Our approach tries to pro-
Markov chain in state (0, 0)) can be obtained from solving vide more precise results considering these characteristics
the Markov chain as shown in Equation (9). in IEEE 802.11.

4
 2(1−2p)(1−p) 0

 W (1−(2p)m+1 )(1−p)+(1−2p)(1−pm+1 ) m≤m
b0,0 = (9)

 2(1−2p)(1−p) 0
0 0 0 0 m>m
W (1−(2p)m +1 )(1−p)+(1−2p)(1−pm+1 )+W 2m p(m +1) (1−2p)(1−pm−m )

4 Distance Aware Model In this expression, P0 denotes the STA transmission


power and α, the path loss exponent, determines the loss
Our model considers the interference from the other rate. We use α = 3 which is commonly used to model loss
STAs and the background noise to compute the packet loss in an urban environment [14]. Note that this model for the
probability p. We call it the DAW (Distance AWare) model. power only considers the attenuation caused by the distance
The expression for the transmission probability τ remains between the emitting terminal and the AP, and ignores other
the same as that in Equation (8). The computation of packet factors such as mobility, shadowing, multi-path fading, etc.
error rate (p) is done under the assumptions we presented in Having the power of each STA at the AP, we can compute
Section 2. the interfering power a packet transmitted by STA k faces.
We denote this power by Ik and write it as;
Let consider an STA k that transmits a packet to the AP
and compute the probability that this packet is lost (i.e., can- n
X
not be decoded correctly). We suppose that this STA is lo- Ik = Yi · L(Di ). (13)
cated at distance dk from the AP. We denote its packet loss i6=k
probability by pk (dk ). Using Equation (5), the packet loss This allows to write the following expression for the
probability can be computed as follow; SNR at the AP of a packet/signal coming from STA k at
the given distance dk :

Pk = 1 − (1 − PbP LCP )LP LCP · (1 − PbP ayload )LP ayload ,


L(dk ) L(d )
(10) SN Rk = = Pn k . (14)
where LP LCP and LP ayload are PLCP and Payload N 0 + Ik N0 + i6=k Yi · L(Di )
length respectively, and Pbx is bit error probability for part
N0 is the background noise (see Equation (1)). We can
x of the packet (PLCP or Payload). Pbx can be computed
see that to compute Pk using Equation (10), the only ran-
using Equation (2) and (3) considering transmission mode.
dom variable is Ik . Hence, having the pdf of Ik , which we
This expression for Pk assumes that the bit error process is
denote by fIk (x), we can compute pk (dk ) = E[Pk ]. As-
iid during the reception of the packet and that the data is
suming independence of Yi , as in the Bianchi model, fIk (x)
not protected by any channel coding scheme. As we need
can be expressed as an n − 1 convolution:
the packet loss probability averaged over all values of bit er-
rors, we will focus on the computation of the expected value
pk (dk ) = E[Pk ]. fIk (x) = fX1 ⊗· · ·⊗fXk−1 ⊗fXk−2 ⊗· · ·⊗fXn (x). (15)
To do so, we need to decompose SNR into identically
distributed elements for which a pdf can be defined. Once In the analysis above, we kept the distance from STA
such pdf is found, we can obtain pk (dk ) by substituting in i to the AP random denoted by Di , except for STA k for
Equation (10) and taking the expectation. In order to de- which we are computing pk . Then we compute pk for two
compose SNR, we first introduce the Bernoulli random vari- cases. First, we compute it when the stations’ positions are
ables Yi (i = 1, . . . , n), being equal to 1 when STA i trans- known (the Di are deterministic): the only randomness in
mits a packet in a slot time, and equal to 0 otherwise. Next this case lies in the dynamics of the MAC layer. Second,
step we look for the power of signal transmitted by STA i at we compute pk for a more general case where nodes are
the AP. We denote such power with Xi and we define it as; uniformly distributed in the plane.

Xi = Yi · L(Di ), (11) 4.1 Fixed Topologies

where L(Di ) expresses the power with which the sig- Suppose we are given the distance vector D =
nal of STA i arrives at the AP after being attenuated over {d1 , . . . , dn }, where di describes the distance of STA i to
distance Di and calculated using simple path loss model; the access point. Since all distances are fixed, we omit in
this section the index of distance from loss and transmis-
P0 sion probabilities. For an STA k, we aim at finding the pdf
L(Di ) = . (12) of Ik . Ik gives the interfering power produced by all the
Diα

5
other STAs at the AP. To compute Ik , we need fX (x), the STAs is supposed to influence the transmission probability
pdf of the power at the AP of an individual STA. For an of STA i. This is the case when the number of STAs is large.
STA i, fXi (x) can be written as: Under this assumption, the variables Xi are independent of
each other. We can therefore compute the pdf of Ik using
fXi (x) = δx (0)(1 − τi ) + δx (L(di ))τi , (16) Equation (15) and (21).
where δx (x0 ) is a Dirac pulse at x = x0 and τi denotes Note that fIk is a function of one unknown E[τi (Di )].
the transmission probability of STA i. fIk (x) can be com- The packet collision probability can be obtained by plug-
puted using Equation (15). Note that the values τi in fIk (x) ging fIk in Equation (17). We substitute then the expres-
are left unknown. sion of pk (dk ) in Equation (8) to get τk (dk ), the probability
Using Equation (10) and taking expectation, we get the with which STA k transmits a packet in a slot time aver-
packet loss probability of STA k: aged over all possible positions of the other STAs. Finally,
the throughput of STA k averaged over all locations of the
other STAs can be computed in a similar way to the fixed
pk = E[1 − (1 − PbP LCP )LP LCP · (1 − PbP ayload )LP ayload ] case as will be discussed in Section 4.3.
(17) Now we explain how to find the expression of E[τi (Di )].
For example when the packet is sent with 1 Mbps, the To solve for this expectation, we write an implicit equation
equation can be simplified as shown in Equation (18) (Since with E[τi (Di )] as a variable, then we solve this equation
the PLCP and the payload are sent with the same modula- numerically. Equations (21) and (17) give us the expression
tion and data rate). of pk (dk ) for STA k as a function of E[τi (Di )]. Denote by
This expression of pk is a function of the transmission pk (dk ) = G(dk , E[τi (Di )]) this expression. Using 17, we
probabilities of the other STAs via the pdf functions fXi . can write;
From the Bianchi model, the transmission probability of an
STA is related to its collision probability via the function in
Equation (8) (by substituting p by pk and τ by τk ). Thus, τk (dk ) = B(pk (dk )) = B(G(dk , E[τi (Di )])) (22)
using Equations (8) and (17), we set up a non linear system
of equations, which can be solved numerically for all pk and We get our implicit equation in E[τi (Di )] by summing
τk . Having the pk and τk , the throughput of any STA k can over all the values of dk , as shown in Equation (23).
be computed. This computation is shown in Section 4.3.
Z r
2πρdρ
4.2 Random Topologies E[τi (Di )] = E[B(pk (dk ))] = B(G(ρ, E[τi (Di )])).
0 πr2
(23)
We consider now the case where the STAs are uniformly Once we obtain E[τi (Di )], all transmission probabilities,
distributed in a disk of radius r around the AP. Thus, the pdf collision probabilities and throughput can be obtained using
of D (the distance to the AP of an STA) has the following our above analysis. In summary, for an STA located at dis-
form: tance dk :
2d
fD (d) = {10≤d≤1 } . (19) • The packet collision probability pk (dk ) can be ob-
r2
tained by plugging Equation (22) in (17), where the
Consider an STA k located at distance dk from the AP,
value of E[τi (Di )] is computed numerically with the
and let us focus at computing its average performance over
implicit Equation (23).
all possible positions of the concurrent STAs. As for fixed
topology case, we have to find the pdf of Ik (The interfer- • The packet transmission probability τk (dk ) is com-
ence caused by the other STAs at the AP.). puted by substituting p by pk (dk ) in Equation (8).
However the computation of fXi (x) (the pdf of signal
power at the AP of a random STA i) becomes more com- • Given pk (dk ) and τk (dk ), the throughput of STA k can
plex. We first write the cumulative distribution function be obtained in a similar way to the Bianchi model. The
of Xi (for x ≥ 0), see Equation (20). In this equation, throughput of a random STA can be computed as well.
E[τi (Di )] is the transmission probability of an STA i aver-
aged over all its possible locations. By differentiation and 4.3 Throughput Calculation
using the expression of L(Di ), we find the pdf of Xi , see
Equation (21). We now derive the throughput of a single STA k at a
Assume that the transmission probability of a random given distance dk . In the case of a fixed topology (Sec-
STA i is only dependent on its own position and indepen- tion 4.1) this throughput depends on the position of all other
dent of that of the others. Only the number of the other STAs and their transmission probabilities τi , whereas in the

6
Z Ã Ãs !!LP LCP +LP ayload

2L(dk )W
Pk = 1 − 1−Q fIk (x)dx. (18)
x=0 (N0 + x)R

µ ¶
(L−1 (x))2
FXi (x) = (1 − E[τi (Di )]) + 1{P0 /rα ≤x≤P0 } E[τi (Di )] 1 − . (20)
r2
µ ¶2/α
2 P0
fXi (x) = δx (1 − E[τi (Di )]) + 1{P0 /rα ≤x≤P0 } 2 E[τi (Di )]. (21)
αr x x

case of random topologies (Section 4.2), the throughput de- probability


Pn that such a transmission is successful, is equal
τ (1−p )
pends on the other STAs average location and their average to i=1 Pitr i . In the case of random positions, only the
transmission probability E[τi (Di )]. expressions of Ptr and Ps change. These expressions are
Consider first the case of fixed topology. The throughput shown in Equation (26) and (27) for an STA k located at
of an STA k is given by the function Z(pk , τk ), which has distance dk to the AP.
the following form:

Ptr = 1 − (1 − τk (dk ))(1 − E[τi (Di )])n−1 (26)


τk (1 − pk )L
Z(pk , τk ) = .
(1 − Ptr )σ + Ptr Ps Ts + Ptr (1 − Ps )Tc
(24) τk (dk )(1 − pk (dk )) + (n − 1)E[τi (Di )](1 − E[pi (Di )])
In the numerator of the throughput expression, we put Ps =
Ptr
the average number of useful bits transmitted in a slot time (27)
whereas the denominator corresponds to the average dura-
tion of a slot. σ is the physical slot time of 802.11 MAC
layer. Ts and Tc are respectively the duration of a slot
5 Model Verification and Simulation Results
(following the slot definition in the Bianchi model) when a
packet is successfully transmitted and the duration of a slot We implemented the DAW analytical model in MATLAB
when two or more packets collide. L is the payload size. and compared the results with ns-2 simulation. Our ns-
We consider MAC, IP and UDP headers in our calculation 2 simulations are based on the package described in [15].
for packet length (The sum of these headers is denoted by In this package we consider the effect of wireless physical
H.). In addition, as explained in Section 2, the PHY layer layer while simulating mobile networks. Physical layer pa-
adds to each transmission a constant PLCP preamble and rameters like path loss, fading, interference and noise com-
header of total duration tP LCP . Similar to [6], the slot time putation are added in this ns-2 simulation package. The ns-2
duration Ts and Tc for basic access mode considering ACK simulation results presented later are averaged over 10 runs
timeout, will become: with different random seeds.
We first consider a fixed topology, i.e the Di values are
 bas deterministically set. For this scenario, we used 2 network
H+L
 Ts = 2tP LCP + DIF S + + SIF S configurations as shown in Fig. 5. The first configuration

 ACK Rd
+ Rb + 2δ consists of one AP and several STAs which send CBR pack-

 ets at saturation rate to the AP using UDP connections. All
 bas H+L ACK
Tc = 2tP LCP + DIF S + Rd + SIF S + Rb STAs are located at 5 meters from the AP. In this configu-
(25) ration, we calculate the total throughput while varying the
Rb is the data rate for the basic transmission mode (i.e., number of STAs. The second configuration consists of one
1 Mbps for 802.11b) and Rd is the data rate for payload AP and 6 STAs: 5 STAs are placed at 5 meters from the
(which is 1 or 2 Mbps in our simulations). Note that for the AP and the 6th STA is moving away the AP from 1 me-
RTS/CTS access mode, all calculation regarding to packet ter to 25 meters. Each meter, it held fixed for 20 minutes
error rate should be done for RTS packets. δ is the propaga- and transmits CBR data over a UDP connection. The fixed
tion delay. STAs send continuously the same traffic as the mobile STA
We come now to the definition of Ptr and Ps in the de- to the AP. We calculate the throughput of both moving and
nominator of Equation (24). With Ptr , we denote the prob- fixed STAs for each position of the mobile node. Further,
Qnn STAs is transmitting, which
ability that at least one of the all simulations are done with two transmission modes (i.e.,
can be formulated as 1 − i=1 (1 − τi ). Further, Ps , the BPSK 1Mbps and QPSK 2 Mbps in IEEE 802.11b).

7
3
3 when it contends for the medium with one or more
4
2 fixed STAs (Ppkt−loss−mov ).
4 2

2. the probability that one fixed STA loses its packet


5
5 meter
1 5 meters when it contends for the medium with the moving STA
5 1
Access Point
Moving From 1 to 25 meters
(Ppkt−loss−f ix ).
6
6 8
These two conditional probabilities illustrate the behav-
ior of DAW model in the second configuration where one
7
node moves. As an example, we calculate the second prob-
(a) Fixed (b) Moving ability (Ppkt−loss−f ix ) for the case where data is trans-
mitted with 1 Mbps. Let τf ix (τmv ) be the transmission
Figure 5. Network topologies. probability of a fixed (moving) STA and df ix (dmv ) be
its distance to the AP. Equation (28) shows this probabil-
ity (Ppkt−loss−f ix ), where bino(i, 5, τf ix ) denote the pdf
For the first configuration, we compare the throughput of a binomial RV with parameters 5 and τf ix that is shown
obtained with the DAW model to the ones computed from in Equation (29). The sum in Equation (28) accounts for
Bianchi’s model and ns-2 simulations. We expect to ob- the different possible values of the number of fixed stations
tain very similar results since the probability that a packet which are transmitting at the same as the moving station.
is erroneous, and hence dropped, is very close to one when Other probability calculations (Ppkt−loss−mov and for dif-
parallel transmissions occur (all STAs are positioned at ferent transmission rates) are straight forward.
the same distance from the AP). The corresponding total As shown in Figure 8 both probabilities (Ppkt−loss−mov
throughput of our distance-aware model and the Bianchi’s and Ppkt−loss−f ix ) are equal to 1 when all STAs have
model along with ns-2 simulations are shown in Fig. 6. We equal distance from AP (same as assumed by the Bianchi’s
can observe a very close match between our model and ns-2 model). Ppkt−loss−mov remains equal to 1 when the mov-
simulation results. ing STA is far from the AP since its power level at the
We now use the DAW model to investigate the through- AP is low comparing to closed and fixed stations. On the
put of the STA that moves through a fixed topology of wire- other hand, Ppkt−loss−f ix drops to 0 at around 5 meters,
less STAs using the second configuration explained above. which means that closed and fixed STAs always win when
Fig. 7 shows the throughput of a fixed STA (at 5 meters their packets collide with the packets from the moving STA
from the AP) and the throughput of the moving STA. We at more than 5 meters from the AP. On the other hand
also plot in the same figure the throughput obtained by an Ppkt−loss−mov drops to 0, when the moving station is near
STA if the Bianchi’s model was used. The results are very the AP (less than 5 meters) and so wins when its packets
interesting. When the moving STA is close to the AP (less collide with packets from fixed stations.
that 5 meters), its throughput is greater than the one of fixed We now consider the random topology case, where STAs
stations. When the moving station and fixed stations are are uniformly distributed in a disk of radius 10 meters cen-
near each other (i.e., around 5 meters) they all have the same tered at the AP. We select one STA and move it from 1 to
throughput and it is equal to the one given by the Bianchi’s 10 meters, and we compute its throughput averaged over all
model (which supposes that two colliding packets are auto- the possible locations of the other 9 STAs using the method
matically lost). Finally, when the moving STA is far from explained in Section 4.2. We also compute the average
the AP (more than 5 meters), its receiving power level at the throughput of any other fixed STA. To validate these results,
AP starts to become lower than that of the close and fixed we have run 250 numerical simulations (with DAW model)
STAs and so its packets are lost when they collide with the for 250 realizations of the fixed topology using above sce-
ones from fixed STAs. The fixed STAs get then a higher nario. We then use the fixed topology method to find the
throughput than the moving STA and the difference is ap- throughput per realization, and we average over all realiza-
proximately equal to the bandwidth not used by the close tions.
and fixed STAs. The Bianchi’s model is no longer good in The results are shown in Fig. 9. When the moving STA is
such moving case as shown in Fig. 7. The result is also close to the AP, it gets a higher throughput than the average
confirmed with ns-2 simulation as shown in the Figures. throughput of the others, since with a high probability the
To better illustrate the above results which are obtained other STAs are far from the AP. However, this throughput
for throughput of fixed and moving STA, we evaluate and decreases when the STA moves farther from the AP until
calculate two conditional probabilities, shown in Fig. 8: it drops below the average throughput of the others. The
results for 250 realizations, shown in Fig. 9, validate our
1. the probability that the moving STA loses its packet analysis in random case (Section 4.2) as well.

8
900 1600
Distance-aware Model BPSK (1Mbps) Distance-aware Model QPSK (2Mbps)
ns-2 simulation results BPSK (1 Mbps) ns-2 simulation results QPSK (2 Mbps)
Bianchi’s Model (1 Mbps) 1550 Bianchi’s Model (2 Mbps)

Mean Throughput (Kbps)


Mean Throughput (Kbps)
850
1500

800 1450

1400
750
1350

700 1300
0 2 4 6 8 10 12 14 0 2 4 6 8 10 12 14
Number of stations Number of stations

Figure 6. Simulation and Model comparison for fixed scenarios for left: 1 Mbps and right: 2 Mbps.

450
240 Distance Aware Model (Fixed Station) Distance Aware Model (Fixed Station)
Distance Aware Model (Moving Station) Distance Aware Model (Moving Station)
ns-2 simulation (Fixed Station) ns-2 simulation (Fixed Station)
220 ns-2 simulation (Moving Station) 400 ns-2 simulation (Moving Station)

Mean Throughput (Kbps)


Mean Throughput (Kbps)

Bianchi Model Bianchi Model


200
350
180

160 300

140
250
120

100 200
0 5 10 15 20 25 0 5 10 15 20 25
Distance (meter) Distance (meter)

Figure 7. Simulation and Model comparison for moving scenarios, left: 1 Mbps and right: 2 Mbps.

P5 ³ ³q ´´LP LCP +LP ayload


2L(dmv )W
i=1 bino(i, 5, τ f ix ) 1 − Q (N0 +i·L(df ix ))R
Ppkt−loss−f ix = 1 − (28)
1 − (1 − τf ix )5

X5 µ ¶
5 i
bino(i, 5, τf ix ) = τf ix (1 − τf ix )5−i δx (i). (29)
x=0
i

1 1

0.01 0.01
Probability of packet loss
Probability of packet loss

0.0001 0.0001

1e-06 1e-06

1e-08 1e-08

1e-10 1e-10

1e-12 1e-12
Packet of a fixed station corrupted by the moving station Packet of a fixed station corrupted by the moving station
Packet of the moving station corrupted by a fixed station Packet of the moving station corrupted by a fixed station
1e-14 1e-14
0 5 10 15 20 25 0 5 10 15 20 25
Distance (meter) Distance (meter)

Figure 8. Packet corruption probability of the moving station, left: 1 Mbps and right: 2 Mbps.

9
150
Random topology: Moving STA
[5] C. H. Foh, M. Zukerman, “Performance Analysis of
Random topology: Fix STA the IEEE 802.11 MAC Protocol”, Proceedings of the
140 250 Realization with fixed topology: Moving STA
250 Realization with fixed topology: Fix STA
130
EW 2002 Conference, Italy.
Mean Throughput (Kbps)

120 [6] H. Wu, Y. Peng, K. Long, J. Ma, “Performance of Re-


110 liable Transport Protocol over IEEE 802.11 Wireless
100 LAN: Analysis and Enhancement”, Proc. of IEEE IN-
90
FOCOM, vol.2, pp. 599-607, 2002.
80 [7] H. Kim and J. Hou, “Improving protocol capacity
70 with model-based frame scheduling in IEEE 802.11-
60 operated WLANs”, ACM MobiCom 2003, Sep. 2003.
0 2 4 6 8 10
Distance (meter)
[8] P. Chatzimisios, V. Vitsas and A. C. Boucouvalas,
Figure 9. Throughput calculation for random “Throughput and Delay analysis of IEEE 802.11 pro-
topology, BPSK(1 Mbps). tocol”, IEEE IWNA, UK, 2002.
[9] P. Chatzimisios, V. Vitsas and A. C. Boucou-
valas,“IEEE 802.11 Packet Delay A Finite Retry Limit
6 Conclusion and Future Works Analysis”, IEEE Globecom, vol. 2, 2003.
[10] Z. Helkov, B. Spasenovski, “Saturation Throughput-
We presented in this paper an analytical model that ac- Delay Analysis of IEEE 802.11 DCF in Fading Chan-
counts for the positions of STAs when evaluating the per- nel”, ICC 2003.
formance of 802.11 MAC layer. Our model achieves more
realistic results comparing to the models which do not con- [11] J. G. Proakis, ”Digital Communications”, 3rd ed., Mc-
sider PHY channel conditions (e.g., in the scenarios where Graw Hill, New York, NY, 1995.
the STAs move).
This model has different extensions on which we are [12] P. Chatzimisios, V. Vitsas and A. C. Boucou-
working on. One extension considers an AP that transmits valas,“Performance Analysis of IEEE 802.11 DCF in
packets, which would allow us to find the optimal AP place- Presence of Transmission Errors”, ICC 2004, Paris.
ment for a given topology. Further extensions could con- [13] J. Gosteau, M. Kamoun, S. Simoens, P. Pellati, “Ana-
sider fading channel models as well. An ad-hoc mode eval- lytical developments on QoS enhancements provided
uation to numerically approach the wireless capacity found by IEEE 802.11 EDCA”, ICC 2004, Paris.
in [4] could be one of its extensions.
[14] T. S. Rappaport, ”Wireless Communications: Princi-
References ples and Practice”. Printice Hall, 1996.
[15] M.H. Manshaei and T. Turletti,“Simulation-Based
[1] IEEE 802.11 WG, part 11a/11b/11g , “Wireless LAN Performance Analysis of 802.11a WLANs”, In Proc.
Medium Access Control (MAC) and Physical Layer of IST, Iran, August 2003.
(PHY) specifications,”, Standard Specification,IEEE,
1999.

[2] Giuseppe Bianchi, “Performance Anaylsis of the


IEEE 802.11 Distributed Coordination Function”,
IEEE Journal on Selected Areas in Communications,
Vol. 18, Number 3, March 2000.

[3] A. Kochut, A. Vasan, A. U. Shankar, A. Agrawala,


”Sniffing out the correct Physical Layer Capture
model in 802.11b”, Proceeding of ICNP 2004, Berlin,
Oct. 2004.

[4] P. Gupta, P. R. Kumar ” The Capacity of Wireless


Networks”, IEEE Transactions on Information The-
ory, Vol. 46, No. 2, March 2000.

10

You might also like